HID GoID Government Mobile ID Solution - A New Era Of Convenience And Security
HID GoID Government Mobile ID Solution - A New Era Of Convenience And Security

HID goID™ platform for mobile IDs delivers the secure infrastructure to allow citizen IDs to be safely provisioned to and authenticated on a smartphone. HID goID™ allows smartphones to be used for identification purposes, but also for transactions in ways not possible with an ID card. HID goID™ Impacts Travel A smartphone using HID goID™ enhances a citizen’s day-to-day experience. Imagine how HID goID™ can impact travel. Today, citizen’s use a national ID or driver’s license at the airport for domestic travel, but also carry a boarding pass separately on a phone or a piece of paper. With HID goID™, the two converge – providing greater security, convenience and flexibility for both the citizen and the authenticating party. Rather than in wallets, IDs can now be securely stored on smartphones. Customized Details HID goID™ can be customized to only release relevant information so citizens can control when and how much information is shared, allowing them to protect their privacy. For example, when a citizen is purchasing age-restricted goods, they only need to provide their photo and age – none of the other personal information loaded on a physical driver’s license needs to be shared. Other HID goID™ advantages include the ability to renew or modify the driver’s licenses and other ID credentials remotely, saving citizens from traveling and waiting in a crowded office environment. This is also good news for government agencies, who can do their jobs more efficiently. Download HID White Paper: Mobile ID Solutions for Government-to-Citizen Applications

Add to Compare
HID Global Showcased Innovations In Physical Access, Logical Access And Secure Card Issuance For Key Vertical Markets At IFSEC 2011
HID Global Showcased Innovations In Physical Access, Logical Access And Secure Card Issuance For Key Vertical Markets At IFSEC 2011

Expert presented a seminar session on migration to high frequency access control systems   HID Global showcased its extensive suite of products and technologies for secure identity-related applications at Stand #C50 in Hall 4 at the National Exhibition Centre (NEC) Birmingham from 16 May to 19 May, 2011. Key HID Global demonstrations at IFSEC ID 2011 included:    The Next Generation of Access Control: HID demonstrated its iCLASS SIO-Enabled (SE) technology platform, which is designed to raise the bar for card-to-reader security while supporting key emerging technologies.  naviGO™ credential management software: Enables the addition of PC logon functionality to cards regardless of the existing physical access control system or IT infrastructure. HID OMNIKEY® reader line: Includes a contact and/or contactless interface with support for a variety of desktop and mobile applications for key verticals.  Printing and Encoding Solutions: HID FARGO® HDP5000 high definition card printer/encoder and advanced generation FARGO direct-to-card printers.  Identity on Demand (IoD) Services: HID services that provide the scale and resources to handle large-volume orders and tight deadlines. Its new secure web portal enables monitoring and managing all aspects of card personalisation projects.  Genuine HID™ Credential Solutions: HID technology cards that enable users to seamlessly manage multiple applications and migration projects through a single credential containing diverse technologies.   During an IFSEC 2011 seminar session, HID Global discussed migration to high frequency access control systems.    Robert Jansson, regional sales manager Nordics with HID Global presented “current technology enables smooth migration to high frequency access control systems,”  where he explored the main drivers motivating organizations to upgrade their access control systems. He explained how migration can pay off in an increased level of security for people and property, as well as operational efficiencies and cost-effectiveness. This seminar session presentation was held from 1:00 p.m. to 1:30 p.m. on Wednesday, 18 May, 2011 at the NEC Birmingham in Theatre 2. 

Add to Compare
HID Global Launches Secure Identity Services
HID Global Launches Secure Identity Services

HID Global has significantly expanded its offering of on-demand card badging services to create the industry’s first all-in-one, web-based source for all credential provisioning and management requirements for traditional badges on plastic cards, for tokens, and for digital credentials that can be carried on NFC-enabled smartphones.   HID Global’s Secure Identity Services is a comprehensive suite of web-based services that help customers address every aspect of provisioning and managing personalized, secure credentials, both today and in the future. This includes managing the daily flow of ID card badge requests and large-volume re-badging projects, combining multiple technology platforms onto one card, and deploying and managing mobile credentials carried on users’ NFC-enabled smartphones.  The first to deliver over-the-air mobile credential technology, HID Global currently offers mobile credential services on selected NFC-enabled BlackBerry smartphones used in the enterprise, and plans to expand these mobile services to support a broad range of credentials and NFC smartphone platforms across all major network operators. HID Global’s Secure Identity Services are available for cards, mobile devices and tokens. Card services include key management, anti-counterfeiting, custom graphics and full personalisation using a wide range of commercial credential technologies. The company also enables customers to meet all of the compliance requirements for issuing PIV-I cards used by federal agencies and their contractors. In addition to streamlining traditional badging projects, the new Secure Identity Services will also enable customers to augment and/or replace mechanical keys and traditional card badges with mobile credentials on NFC smartphones, while managing all credential needs from the same web-based portal using one convenient dashboard. Users can create secure identity for NFC-enabled handsets and digital keys using the service’s cloud-based portal in a managed-service context, and then provision them over the air onto their smartphones. These secure identities can be used to open residential locks, access on-line physical access control readers or NFC-enabled electromechanical locks and log on to PCs. All management can be performed over-the-air, including dynamic, context-based rule setting.  In the future, users will also be able to share digital cards and keys with authorized users via NFC “tap-n-give” provisioning, and generate one-time password (OTP) soft tokens for network access. HID Global’s Secure Identity Services are available now. Mobile services are also available now, for iCLASS credentials on BlackBerry Bold 9930 and BlackBerry Curve 9370 smartphones from Verizon Wireless, managed by administrators using BlackBerry Enterprise Server (BES). More information is available at here.

Add to Compare

Access control software - Expert commentary

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

4 Ways To Keep Your Workplace Protected From COVID-19
4 Ways To Keep Your Workplace Protected From COVID-19

The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupants in any emergency requires preparation and clear communication. This is especially critical in a health crisis involving an infectious disease. These are some of the essential best practices that could help organizations reduce the impact on their employees and operations during this pandemic. 1. Use a visitor management system With a visitor management system, organizations have a single source of real-time and historical insights into who is, or was recently, in the workplace. This is especially important because of the need to perform contact tracing should anyone in the organization show symptoms of COVID-19, meaning everyone they have been in contact with needs to be contacted and asked to isolate. Yet still, first impressions are made at the front desk or lobby, where the visitor experience needs to be a positive one. At the same time, though, any emergency event requires that there be strict control over who is entering the workplace. This policy also needs to be clearly communicated to visitors. Doing this minimizes risk to visitors as well as the workforce. In addition to delivering a high-quality visitor experience, the ideal visitor management system must: Enable organizations to meet regulatory compliance mandates and facilitate check-in at a self-service kiosk to minimize wait times. Customize the visitor experience to support specific security needs, such as accelerating and simplifying check-in or requiring additional security pre-checks. Automate compliance as it relates to visitor access rules with historical visit reports. 2. Pre-check questions at visitor registration kiosks Organizations can strengthen security at the registration kiosk using a flexible, enterprise-grade visitor management system to add visitor sign-in steps. This has proven successful in the past when used to control the spread of infectious disease during an outbreak. An example of this is a U.S. children's hospital which managed to reduce facility infection rates by 25 percent over a two-year period using a commercial, off-the-shelf physical identity and access management (PIAM) solution from HID Global. The solution provides two particularly important capabilities that can be used by organizations to protect their workplace from the uncontrolled spread of an infectious disease: Enhance visitor registration policy with additional mandatory questions to help identify any visitors who may need other screenings. Extend the visitor registration kiosk with a mandatory pop-up asking further questions during visitor check-in. 3. Understand who has visited your workplace Successful controlling the spread of infection throughout a facility requires the ability to automatically maintain an auditable trail of activity. This can be done using an enterprise-grade visitor management system that makes it easy to retrieve historical visit reports. This provides a timeline of who was in the workplace, and when they were there. Key features include: A single dashboard providing useful visitor insights at your fingertips. Historical reports that provide visitor details including location and contact information, all in compliance with General Data Protection Regulation (GDPR) and other privacy regulations. 4. Clearly communicate how infection risks can be reduced Global organizations must actively communicate with visitors and employees on the outbreak of infectious diseases and follow best practices outlined by the World Health Organization (WHO). Here are several things organizations can do in this area to help maintain a safe and healthy workplace: Re-enforce and communicate WHO best practices with guideline posters in the front lobby and throughout the workplace. Add posters that also encourage regular and thorough washing of hands. Encourage everyone to cough or sneese into their shirt sleeve in their flexed elbow or cover their mouth and nose with a tissue. Encourage everyone to keep a relatively safe distance from each other and use alternatives to handshakes when saying hello. Organizations must contend with a variety of workplace challenges during the outbreak of an infectious disease. These challenges can be solved with best practices that include a comprehensive visitor management system that automates critical check-in policies and maintains an auditable trail of visitor activity.  

The Role Of Building Systems To Ensure Safety As Employees Return To Work
The Role Of Building Systems To Ensure Safety As Employees Return To Work

Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. “While the ‘new normal’ is still being defined, we believe there will be a greater focus on creating healthier environments while also complying with new regulations,” says Marcus Logan, Global Offering Leader, Honeywell Commercial Security. “Temperature, humidity, energy efficiency, security, safety, comfort, productivity, and demonstrating compliance with regulations are all a part of a healthy building.” For example, social distancing is a new concept for the workplace. How do you make that happen in an open work setting, in breakrooms, elevator lobbies and meeting spaces? Optimized systems create healthier environments Anxious employees will need reassurance about returning to the workplace Building owners will need to look at how they can optimize their systems – or deploy new ones – to create a healthier environment. Building technologies, like those provided by Honeywell's Healthy Buildings solutions, provide building owners with more control over critical factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations, and a company's risk management policies. These solutions also provide transparency for occupants into a building's status, says Logan. Hygiene will be a critical issue: People will want to know that the spaces are ready for their return. Increased cleaning procedures and schedules will evolve, and a way will be needed to demonstrate the procedures are effective and that they have been strictly adhered to. Identifying ways to measure effectiveness of sanitisation and track compliance to the procedures will be a key challenge to solve. This is a space that will evolve significantly in the coming months and years, says Logan. Access control and video analytics Contact tracing is a new requirement in some businesses, and security technology – like access control and video analytics with advanced reporting – can help. Access control technology integrated with video analytics can be used to trace occupant movements within a facility. These technologies capture data that can be used with advanced reporting to provide a digital footprint of where a person has been within a facility and if they may have been exposed to someone identified as being infected with a contagious virus. Building owners can then proactively notify exposed individuals evolve to self-quarantine and minimize further spread of an infection. Video analytics can help to predict where and when occupants encounter each other Anxious employees will need reassurance about returning to the workplace. They will not only seek confidence that the building is optimized for a healthier environment but also that processes are in place to quickly identify and respond to potential issues. Transparency and visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace. “One way to do this is to share building analytics with occupants – to help them understand factors about the indoor air quality or occupancy density,” says Logan. Controlled health, safety and security Honeywell’s solutions provide building owners with more control over critical health, safety and security factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations and a company’s risk management policies, Logan adds. Visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace Every day there is new information coming from the medical and scientific community about COVID-19, and the building industry is just starting to learn what it all means. Logan warns that there is no single solution that will keep every environment healthy and safe. A good strategy features deploying a combination of solutions, optimising systems and being vigilant to make sure that companies are sustaining compliance to new and changing regulations, says Logan. “Today more than ever we must be mindful of the changing culture of how buildings are managed by making apparent the need to be mindful of health and well-being in all aspects of our lives,” says Logan. Honeywell has developed outcome-based solutions that allow building owners to transparently address building quality factors while supporting their business continuity needs in the uncertain environment. “We’re giving them the data they need to confidently reassure their employees to accelerate their business operations,” he adds.

Latest HID Global news

HID Global Pilot Program Demonstrates Social Distancing and Contact Tracing
HID Global Pilot Program Demonstrates Social Distancing and Contact Tracing

If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organizations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles.   “This facility is large enough and diverse enough that it provides great test results and quality data to analyze,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymized, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon.   Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyze room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyze room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.

HID Global Announces Aero Controller Platform With Encrypted Communication And Threat Detection
HID Global Announces Aero Controller Platform With Encrypted Communication And Threat Detection

Building on the success of HID’s Mercury, HID Global, a worldwide provider in trusted identity solutions, has announced the HID Aero platform featuring its next generation of open-architecture intelligent controllers that increase choices for a wide range of businesses while future-proofing access control investments as requirements change. “HID Aero is providing a broader market with features that were generally available only in solutions for larger organizations, while eliminating the ongoing cost and complexity of designing, manufacturing and maintaining panel hardware at the same time,” said Jaroslav Barton, Director of Product Marketing at HID Global. “It also brings end-to-end security to everyday applications with encrypted communication and threat detection, and robust features to meet corporate compliance.” Access control software with low maintenance Based on HID’s Mercury hardware used in more than four million panels shipped globally, the HID Aero platform speeds development time for access control solution providers by including all required hardware, firmware, software and development tools. Benefits for users include: Easily adaptable to evolving requirements: Users can choose from a large variety of access control software providers when deploying solutions. Systems are also easy to migrate to new software and highly configurable to dynamically enhance situational awareness. Lower installation and maintenance costs: HID Aero enables remote management capabilities with HID readers supporting Open Supervised Device Protocol (OSDP), including its recently announced Signo readers with built-in support. This minimizes the need for field inspection and reconfiguration. Key encryption and backward compatibilty End-to-end security from credential to host: HID Aero brings to smaller businesses many features generally available only in enterprise-class solutions, including host and controller authentication, encryption to protect keys and sophisticated threat detection. Trusted reliability, proven technology: Based on HID Mercury panel hardware and system technology, the durable controllers fit in the same footprint as earlier HID VertX® controllers and are backward compatible with HID VertX modules to simplify upgrades.

HID Global Expands Biometric Identity Verification To Police Forces And Military Installations Around The Globe
HID Global Expands Biometric Identity Verification To Police Forces And Military Installations Around The Globe

HID Global, a worldwide provider of trusted identity solutions, announced the expansion of its biometrics identification management solutions to police departments and military installations around the globe. A large police force that covers a major capital city in Europe is using its HID NOMAD 30 Pocket Reader for rapid suspect identification in the field. Initially launched for Android platforms, the solution’s SDK is now available for iOS devices. This extends Bring-Your-Own-Device (BYOD) benefits to a wider scope of clients who seek a truly flexible and cellphone single-fingerprint verification solution. cellphone biometric solutions “The expansion of our offering to include iOS platforms broadens the adaptability and application of our cellphone biometric solutions and equips our customers - from law enforcement to military officials - with the confidence to achieve rapid identification anywhere,” said Jessica Westerouen van Meeteren, VP and Managing Director, Citizen Identity with HID Global. “Ensuring that our portfolio of proven solutions is optimized with the latest, best-in-class capabilities to create safer societies is key to our mission as a global leader in trusted identities.” Biometric reader hardware The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency The HID NOMAD 30 Pocket Reader’s PIV-certified sensor enables end-users, such as law enforcement officers, to quickly capture and verify single fingerprints against databases and eliminates the need to transport suspects to a central booking station. With Android and iOS availability driving wider adoption, officers can simply pair their own cellphone devices with the biometric reader hardware and perform watchlist matching within minutes while in the field, leaving custody space open for confirmed offenders. The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency and reduce time and booking costs associated with processing a suspect in a police station. During the first year of deployment, one city saw a six-fold increase in the number of suspects identified and more than $600,000 in savings. Extending biometrics to military bases As a provider of cellphone biometrics, HID Global also provides a broad range of biometric identity management solutions to customers beyond law enforcement. One of the company’s many offerings include the HID SEEK Avenger rugged handheld biometric reader that is used by military bases around the world to accurately identify individuals and provide access to their premises. The solution captures high-quality fingerprints and IAP-40 compliant iris images for verification against as many as 250,000 records and offers offline functionality in harsh environments where connectivity is compromised. HID recently extended the HID SEEK Avenger biometric reader with several features, such as support for Windows 10, an upgraded camera, double the memory and hard drive capacity for enhanced speed and performance, which expands upon its powerful watchlist matching capabilities.

Related white papers

Automatic Vehicle Identification: State Of The Industry 2020

How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce Cost

11 Considerations For Embedded System RFID Readers